()allows a laptop to connect to other devices such as monitor, printer, etc.A、Docking stationB、SwitchC、RouterD、Hub

()allows a laptop to connect to other devices such as monitor, printer, etc.

  • A、Docking station
  • B、Switch
  • C、Router
  • D、Hub

相关考题:

is a multimedia Internet service that allows users to traverse the Internet by moving from one document to another via links that connect them together.A.FTPB.WWWC.E-mailD.TCP

A company finished upgrading the wireless encryption to WPA2 Enterprise. The administratorreceives a call from a user who is unable to connect to the company wireless.Which of the following is MOST likely causing the connection problem?()A. The laptop is missing the software supplicantB. The access point SSID is hidden.C. The laptop only supports TKIP and AES encryption,D. The access point is on the wrong channel.

()allows a laptop to connect to other devices such as monitor, printer, etc. A.Docking stationB.SwitchC.RouterD.Hub

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

(C)“Get your hands off me, I have been stolen,” the laptop, a portable computer, shouted. That is a new solution to laptop computer theft: a program that lets owners give their property a voice when it has been taken.The program allows users to display alerts on the missing computer’s screen and even to set a spoken message. Tracking software for stolen laptops has been on the market for some time, but this is thought to be the first that allows owners to give the thief a piece of their mind.Owners must report their laptop missing by logging on to a website, which sends a message to the model: a red and yellow “lost or stolen” banner pops up on its screen when it is started. Under the latest version(版本) of the software, users can also send a spoken message.The message can be set to reappear every 30 seconds, no matter how many times the thief closes it. “One customer sent a message saying, ‘You are being tracked. I am right at your door’,” said Carrie Hafeman, chief executive of the company which produces the program, Retriever.In the latest version, people can add a spoken message. The default through the computer’s speakers is: “Help, this laptop is reported lost or stolen. If you are not my owner, please report me now.”The Retriever software package, which costs $29.95 (£21) but has a free trial period, has the functions of many security software programs. Owners can remotely switch to an alternative password prompt if they fear that the thief has also got hold of the access details.If a thief accesses the internet with the stolen laptop, Retriever will collect information on the internet service provider in use, so that the police can be alerted to its location.Thousands of laptops are stolen every year from homes and offices, but with the use of laptops increasing, the number stolen while their owners are out and about has been rising sharply.Other security software allows users to erase data remotely or lock down the computer.72. The expression “to give the thief a piece of their mind” can be understood as “_______”.A. to give the thief an alert mind B. to express the owners’ anger to the thiefC. to remind the thief of his conscience D. to make the thief give up his mind

One function of the program is that it allows the owner to ______ at a distance.A. change some access details for switching on the laptopB. turn on the laptop by using the original passwordC. operate the laptop by means of an alternative passwordD. erase the information kept in the stolen laptop

Which statements is true about Foreign Exchange Station (FXS) ports on a router?()A、the FXS interface allows an analog connection to be directed at the public switched telephone network (PSTN’s) central officeB、the FXS interface connect directly to a standard telephone, fax machine, or sililar device and supplies ring, voltage, and dial toneC、the FXS interface connect directly to an IP phone and supplies ring, voltage, and dial toneD、the FXS interface connect directly to ISDN voice channels

An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A、Setup an ACL that allows and logs all IP traffic between the two computersB、Configure a spanning tree to check for a loopC、Setup a span port on the switch to watch for CRC errorsD、Connect both computers using a crossover cable

A customer, Bob, needs to be able to access the Internet while traveling. Which of the following could Jill, a technician, recommend to Bob?()A、Cellular service with an adapter for Bob’s laptop.B、USB adapter with 802.11n capabilities for maximum speeds.C、A Bluetooth card to attach to multiple networks.D、Enable Wi-Fi so Bob can connect to any open network.

What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)A、It provides multiprotocol support.B、It provides improved availability, strong security, and business continuance measures.C、It enables you to connect Cisco VSAN technology and DAS technology.D、It reduces cost and complexity by providing an easy transition to evolving technologies.E、It allows you to create separate networks on the VSAN.F、It allows you to migrate to new technologies without a complete equipment upgrade.

A home user would like to connect their laptop display to their home HD television. Which of the following is the BEST solution?()A、Connecting the laptop’s VGA output to an HDMI adaptorB、Connecting the laptop’s VGA output to the television’s VGA inputC、Connecting the laptop's USB output to the HD television’s HDMI adaptorD、Connecting the laptop’s USB output to the television’s USB input

A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()A、RJ-11 connector needs to be re-crimpedB、User has plugged into the laptop's NIC portC、User has plugged the wrong end of the cable into the portD、RJ-11 connector needs to be replaced with an RJ-45 connector

A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A、Upgrade the operating system to Windows XP Home.B、Have the customer convert to NTFS and enable data encryption.C、Tell the customer that a laptop should not be used for classified data.D、Configure the wireless adapter to only connect to secure networks.

An executive’s laptop screen has been damaged and will not power on. Which of the following is the FASTEST way to get the executive back online?()A、Pull the hard drive and install it in a spare laptop of the same make and model.B、Replace the motherboard on the laptop.C、Build the executive a temporary laptop and attempt to repair the damaged one.D、Replace the backlight on the laptop.

Which of the following would be the correct way to dispose of a laptop battery? ()A、Place the battery on a shelf for storage.B、Place the battery in a trash compactor separately from the laptop.C、Dispose of the battery in the same manner as the laptop.D、Refer to the disposal information located on the battery.

A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A、The laptop is missing the software supplicantB、The access point SSID is hidden.C、The laptop only supports TKIP and AES encryption,D、The access point is on the wrong channel.

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network.  What should you do to enforce the group policy wireless settings to the laptop computers()A、Execute gpupdate/target:computer command at the command prompt on laptop computersB、Execute Add a network command and leave the SSID (service set identifier) blankC、Execute gpupdate/boot command at the command prompt on laptops computersD、Connect each laptop computer to a wired network and log off the laptop computer and then login again.E、None of the above

单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()AThe laptop is missing the software supplicantBThe access point SSID is hidden.CThe laptop only supports TKIP and AES encryption,DThe access point is on the wrong channel.

单选题What is the purpose of the equalizing beam aboard a crane vessel().AIt allows for rotation of the hook in the single modeBIt is required to“twin-up”30-ton pedestal cranesCIt is used to pick up light loadsDIt is used to rigidly connect two cranes

单选题ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network.  What should you do to enforce the group policy wireless settings to the laptop computers()AExecute gpupdate/target:computer command at the command prompt on laptop computersBExecute Add a network command and leave the SSID (service set identifier) blankCExecute gpupdate/boot command at the command prompt on laptops computersDConnect each laptop computer to a wired network and log off the laptop computer and then login again.ENone of the above

单选题A customer, Bob, needs to be able to access the Internet while traveling. Which of the following could Jill, a technician, recommend to Bob?()ACellular service with an adapter for Bob’s laptop.BUSB adapter with 802.11n capabilities for maximum speeds.CA Bluetooth card to attach to multiple networks.DEnable Wi-Fi so Bob can connect to any open network.

单选题A user reports their laptop computer can no longer connect to a server. The computer works correctly in a different office. Which of the following tools would be used to troubleshoot this issue?()ACable testerBMultimeterCFiber splicerDLoopback plug

单选题A user replaces a laptop’s wireless PCMCIA card with a different vendor’s card. All of the new card configuration steps have been followed. The OS sees all known wireless networks but cannot connect to the user’s network. Which of the following is the MOST likely reason for this behavior?()ADMZ is enabled.BMAC filtering is enabled.CWEP is being used.DSSID broadcast is disabled.

多选题What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)AIt provides multiprotocol support.BIt provides improved availability, strong security, and business continuance measures.CIt enables you to connect Cisco VSAN technology and DAS technology.DIt reduces cost and complexity by providing an easy transition to evolving technologies.EIt allows you to create separate networks on the VSAN.FIt allows you to migrate to new technologies without a complete equipment upgrade.

单选题Which statements is true about Foreign Exchange Station (FXS) ports on a router?()Athe FXS interface allows an analog connection to be directed at the public switched telephone network (PSTN’s) central officeBthe FXS interface connect directly to a standard telephone, fax machine, or sililar device and supplies ring, voltage, and dial toneCthe FXS interface connect directly to an IP phone and supplies ring, voltage, and dial toneDthe FXS interface connect directly to ISDN voice channels

单选题Which of the following cables can be used to directly connect a laptop to a PC for ICS?()AIEEE 1394 cableBCAT5 crossover cableCCAT5e patch cableDParallel cable